메뉴 건너뛰기




Volumn , Issue , 2010, Pages 154-160

High performance firewalls in MANETs

Author keywords

Firewall; MANETs; Policy routing; Security

Indexed keywords

AD HOC ROUTING PROTOCOL; BATTERY POWER; CONTROL TRAFFIC; FIREWALL; MANETS; MOBILE NODES; PACKET FORWARDING; POLICY ROUTING; ROUTE SELECTION; SECURITY; SIMULATED ENVIRONMENT; SIMULATION RESULT; SOURCE ADDRESS; UNWANTED PACKETS;

EID: 79952550254     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MSN.2010.30     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 3
    • 0041438387 scopus 로고    scopus 로고
    • IMPORTANT: A framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks
    • F. Bai, N. Sadagopan, and A. Helmy, "IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks," in Proc. of Infocom, 2003.
    • (2003) Proc. of Infocom
    • Bai, F.1    Sadagopan, N.2    Helmy, A.3
  • 4
    • 0005908365 scopus 로고    scopus 로고
    • Distributed firewalls
    • November
    • S. M. Bellovin, "Distributed firewalls," ;login:, pp. 39-47, November 1999.
    • (1999) Login , pp. 39-47
    • Bellovin, S.M.1
  • 5
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of ACM, vol. 13, no. 7, pp. 422-426, July 1970.
    • (1970) Communications of ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 6
    • 0038675868 scopus 로고    scopus 로고
    • A survey of mobility models for ad hoc network research
    • DOI 10.1002/wcm.72
    • T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Communication and Mobile Computing: Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, pp. 483-502, Sep. 2002. (Pubitemid 135713186)
    • (2002) Wireless Communications and Mobile Computing , vol.2 , Issue.5 , pp. 483-502
    • Camp, T.1    Boleng, J.2    Davies, V.3
  • 17
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • Jan-Mar
    • D. Raymond and S. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," IEEE Pervasive Computing, vol. 7, no. 1, pp. 74-81, Jan-Mar 2008.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.1    Midkiff, S.2
  • 18
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, L. Zhang, and S. Member, "Statistical en-route filtering of injected false data in sensor networks," in INFOCOM, 2005.
    • (2005) INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4    Member, S.5
  • 19
    • 51349133403 scopus 로고    scopus 로고
    • Department of Computer Science, Columbia University, Tech. Rep. CUCS-017-07, March
    • H. Zhao and S. M. Bellovin, "Policy algebras for hybrid firewalls," Department of Computer Science, Columbia University, Tech. Rep. CUCS-017-07, March 2007.
    • (2007) Policy Algebras for Hybrid Firewalls
    • Zhao, H.1    Bellovin, S.M.2
  • 20
    • 79952549607 scopus 로고    scopus 로고
    • Department of Computer Science, Columbia University, Tech. Rep. CUCS-33-09, July
    • -, "Source prefix filtering in ROFL," Department of Computer Science, Columbia University, Tech. Rep. CUCS-33-09, July 2009.
    • (2009) Source Prefix Filtering in ROFL
    • Zhao, H.1    Bellov, S.M.2
  • 22
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in IEEE Symposium on Security and Privacy, 2004.
    • (2004) IEEE Symposium on Security and Privacy
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.